![]() ![]() #CVE-2023-25736: Invalid downcast in GetTableSelectionMode Reporter Lukas Bernhard Impact low DescriptionĪn invalid downcast from nsHTMLDocument to nsIContent could have lead to undefined behavior. The return value from gfx::SourceSurfaceSkia::Map() wasn't being verified which could have potentially lead to a null pointer dereference. #CVE-2023-25733: Possible null pointer dereference in TaskbarPreviewCallback Reporter Ronald Crane Impact low Description #CVE-2023-25731: Prototype pollution when rendering URLPreview Reporter pyakovlev & Alexander Volkov Impact low Descriptionĭue to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This bug only affects Firefox for Windows. This also had the potential to leak NTLM credentials to the resource. scf script from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. scf files could cause unexpected network loads Reporter Axel Chong Impact moderate DescriptionĪfter downloading a Windows. url shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. url files could cause unexpected network loads Reporter Ameen Basha M K and Shaheen Fazim Impact moderate DescriptionĪfter downloading a Windows. When encoding data from an inputStream in xpcom the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. #CVE-2023-25732: Out of bounds memory write from EncodeInputStream Reporter Ronald Crane Impact moderate Description This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. Permission prompts for opening external schemes were only shown for ContentPrincipals resulting in extensions being able to open them without user interaction via ExpandedPrincipals. #CVE-2023-25729: Extensions could have opened external schemes without user knowledge Reporter Vitor Torres Impact moderate Description Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in ScriptLoadContext. #CVE-2023-25739: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Reporter Holger Fuhrmannek Impact high Description This bug only affects Firefox on Windows. Members of the DEVMODEW struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables. #CVE-2023-25738: Printing on Windows could potentially crash Firefox with some device drivers Reporter Mark Impact high Description #CVE-2023-25737: Invalid downcast in SVGUtils::SetupStrokeGeometry Reporter Lukas Bernhard Impact high DescriptionĪn invalid downcast from nsTextNode to SVGElement could have lead to undefined behavior. #CVE-2023-25735: Potential use-after-free from compartment mismatch in SpiderMonkey Reporter Samuel Groß Impact high DescriptionĬross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. #CVE-2023-0767: Arbitrary memory write via PKCS 12 in NSS Reporter Christian Holler Impact high DescriptionĪn attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. Other versions of Firefox are unaffected. #CVE-2023-25743: Fullscreen notification not shown in Firefox Focus Reporter Hafiizh Impact high DescriptionĪ lack of in app notification for entering fullscreen mode could have lead to a malicious website spoofing browser chrome. #CVE-2023-25730: Screen hijack via browser fullscreen mode Reporter Irvan Kurniawan Impact high DescriptionĪ background script invoking requestFullscreen and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. The Content-Security-Policy-Report-Only header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. ![]() #CVE-2023-25728: Content security policy leak in violation reports using iframes Reporter Johan Carlsson Impact high Description Mozilla Foundation Security Advisory 2023-05 Security Vulnerabilities fixed in Firefox 110 Announced FebruImpact high Products Firefox Fixed in ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |